1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
4 years ago
12

Traffic shaping reduces traffic by ________. preventing certain undesirable traffic from entering the network limiting the amoun

t of certain undesirable traffic entering the network both preventing certain undesirable traffic from entering the network and limiting the amount of certain undesirable traffic entering the network neither preventing certain undesirable traffic from entering the network nor limiting the amount of certain undesirable traffic entering the network
Computers and Technology
1 answer:
Lera25 [3.4K]4 years ago
5 0

Answer:

Explanation:

Traffic Shaping is a technique for managing congestion on a network by delaying the flow of less important/desired packets on the network so more valuable/desirables ones are able to pass. Traffic shaping reduces traffic by preventing certain undesirable traffic from entering the network as well as limiting the amount of certain undesirable traffic entering the network.

You might be interested in
With which type of satellite is there a propagation delay?
Flauer [41]

Geostationary satellites have a high propagation delay.

8 0
3 years ago
When should an individual consider entering parenthood?
-BARSIC- [3]
  In my opinion, after marriage. And during the time you're married, be sure you are going to stay with that person a long time because divorces can cause mental health issues towards the child. And if your loved one is abusive, an alcoholic, etc. then you should get out that relationship immediately before having children. Therefore, your children will have a happy, healthy, life. 
5 0
3 years ago
Which term is used to describe a public-key, cryptography-based mechanism for proving the source (and possibly integrity) of a d
Olegator [25]

The question below has multiple answers

<span>a)      </span>Trusted third party

<span> <span>b)      </span>Symmetric Cryptography <span> <span>c)       </span>Algorithm <span> <span>d)      </span>Digital signature The answer is (D) Digital Signature It uses the private key of a sender and is a mathematical technique that validates the integrity and authenticity through a public key encryption of a digital or a software document. It is normally attached to digital or a software document to verify the sender’s identity and its content. </span></span></span>




5 0
3 years ago
Read 2 more answers
What is an example of a primary storage
Feliz [49]
Primary storage is usually termed as the viotile storage unit directly accessible as the main device to the CPU. So the main form of primary storage is RAM. It is the main storage unit where you keep your long term memory for your computer
5 0
4 years ago
WOULD SOMEONE PLEASE ANSWER THIS IVE ASKED TWICE ALREADY!
Rainbow [258]
I think that’s right, hope it helps!:) brainliest??

7 0
3 years ago
Other questions:
  • What is the difference between a router and a modem
    15·1 answer
  • What are the flowchart symbols?​
    6·1 answer
  • You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to
    13·1 answer
  • Define ethical (include a link to the source of definition). Describe the ethical dilemma (issue) in this scenario.
    12·1 answer
  • Based on the details in The Riddle of the Rosetta Stone, how did the career of Jean-Baptiste Fourier differ from that of Jacques
    9·2 answers
  • Cómo mi dificar el aspecto del texto​
    12·2 answers
  • 4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by begin
    13·1 answer
  • Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
    15·1 answer
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
  • An Inspect and Adapt (I&amp;A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!